Job Description

REQUIRED TECHNICAL SET
Strong hands-on experience with Microsoft Sentinel for SIEM and SOAR operations.
Expertise in log ingestion, data connectors, and analytics rule configuration.
Ability to create custom KQL queries for threat detection and reporting.
Experience in incident triage, investigation, and automated response playbooks.
Knowledge of integration with Microsoft Defender suite and third-party security tools.
Familiarity with MITRE ATT&CK framework and threat hunting techniques.
Proficiency in PowerShell and automation scripting for Sentinel workflows.
Understanding of compliance requirements and security monitoring best practices
DESIRED COMPETENCIES
5+ years of experience in SIEM operations, with at least 3 years on Microsoft Sentinel. Strong knowledge of KQL (Kusto Query Language) for advanced analytics.
Hands-on experience in incident response and playbook automation.
Ability to design and implement custom detection rules and dashboards...

Apply for this Position

Ready to join Tata Consultancy Services? Click the button below to submit your application.

Submit Application